Miggo Logo

CVE-2025-24434:
Improper Authorization vulnerability in Magento and Adobe Commerce

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.45708%
Published
2/11/2025
Updated
2/28/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.4.8-beta1, < 2.4.8-beta22.4.8-beta2
magento/community-editioncomposer>= 2.4.7-beta1, < 2.4.7-p42.4.7-p4
magento/community-editioncomposer>= 2.4.6-p1, < 2.4.6-p92.4.6-p9
magento/community-editioncomposer>= 2.4.5-p1, < 2.4.5-p112.4.5-p11
magento/community-editioncomposer< 2.4.4-p122.4.4-p12
magento/project-community-editioncomposer<= 2.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability involves improper authorization (CWE-285/863) leading to privilege escalation. Magento's admin controllers and API endpoints are common vectors for such issues. The listed functions are inferred based on patterns in historical Magento vulnerabilities (e.g., missing _isAllowed() checks in controllers, weak authentication logic, or API ACL bypasses). Without patch/diff data, confidence remains medium, as these are educated guesses aligned with the described attack vector (session takeover via authorization bypass).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**o** *omm*r** v*rsions *.*.*-**t**, *.*.*-p*, *.*.*-p*, *.*.*-p**, *.*.*-p** *n* **rli*r *r* *****t** *y *n Improp*r *ut*oriz*tion vuln*r**ility t**t *oul* r*sult in Privil*** *s**l*tion. *n *tt**k*r *oul* l*v*r*** t*is vuln*r**ility to *yp*ss s**ur

Reasoning

T** vuln*r**ility involv*s improp*r *ut*oriz*tion (*W*-***/***) l***in* to privil*** *s**l*tion. M***nto's **min *ontroll*rs *n* *PI *n*points *r* *ommon v**tors *or su** issu*s. T** list** *un*tions *r* in**rr** **s** on p*tt*rns in *istori**l M***n